Font Size: a A A

The Research Of Access Control Model Based On Trust In Cloud Computing

Posted on:2014-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:M B ZhaoFull Text:PDF
GTID:2268330401474432Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapidly development of cloud computing, more and more attentions have been paid to cloud security. How to ensure that the cloud environment can provide high quality service for legitimate users and prevent unauthorized users’ access or legitimate users’ unauthorized access has become one of the hottest spots of cloud security. And this is exactly what the access control studies lies on. So designing a reasonable access control model for cloud environment has become the urgent need of cloud computing.In this paper, we propose a trust-based access control model in cloud environment for the problem of cloud security. First, analyzing the characteristics of cloud computing and the current access control model, and find the defects of the existing access control models which can been applied to cloud computing environment. Secondly, proposing the definition of trust and the method of how to calculate the trust value which using a more scientific approach to calculate the integrated trust value. Thirdly, proposing a trust-based access control model which is based on role-based access control model. This model imports the concept of trust and defines the access control processes in detail. Fourth, describing the protocols which are used by the trust-based access control model in the practical cloud computing environmental, providing the certification process of the access control model. Finally, build a real physical environment for the access control model, and test the actual effect of the model in the real environment.Because of the trust values in the trust-based access control is interacted through the historical records, so the model is well adapted to the dynamic nature of the cloud computing; the authentication server and the final application server are not in the same domain, so it meets the cross-domain characteristics of cloud computing; according to the value of trust in the cloud computing access control model, you can select the optimal application server to server for you, in order to achieve the optimization of services.
Keywords/Search Tags:Cloud Computing, Access Control, Trust, Role Based Access Control
PDF Full Text Request
Related items